1. Docs
  2. Reference
  3. Pre-built Policy Packs
  4. HITRUST
  5. AWS

HITRUST CSF 11.5 - AWS

    This page lists all 130 policies in the HITRUST CSF 11.5 pack for AWS.

    Policy NameDescriptionFramework ReferenceFramework Specification
    api-gateway-authorizationEnsures API Gateway methods use strong authorization instead of NONE01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    iam-role-session-durationEnforces maximum session duration for IAM roles01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    kms-grant-access-controlValidates KMS grants for least privilege access control01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    kms-key-policy-access-controlValidates KMS key policies for least privilege and separation of duties01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    rds-iam-authenticationEnsures RDS instances have IAM database authentication enabled01.a Access Control PolicyAll users shall have a unique identifier for their personal and sole use so that users can be linked to and made responsible for their actions.
    restrict-default-iam-user-creationEnsures that default IAM user accounts are not allowed to be created01.b User RegistrationUser registration shall be used for authorizing and enabling access to information systems and services and for revoking access rights.
    iam-password-policy-minimum-password-lengthEnsure IAM password policy requires minimum length of 14 or greater.01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    iam-password-policy-prevent-reuseEnsure IAM password policy prevents password reuse.01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    lambda-permission-configure-source-arnChecks that lambda function permissions have a source arn specified.01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    iam-group-policy-least-privilegeEnsures IAM group policies follow least privilege principles01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    iam-policy-least-privilegeEnsures IAM policies follow least privilege principles01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    iam-role-least-privilegeEnsures IAM roles follow least privilege principles01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    iam-role-policy-least-privilegeEnsures IAM role policies follow least privilege principles01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    iam-user-policy-least-privilegeEnsures IAM user policies follow least privilege principles01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    pubsub-least-privilege-iamEnsures IAM policies follow least privilege principles for Pub/Sub services (SNS, SQS, Kinesis)01.c Privilege ManagementThe allocation and use of privileges shall be restricted and controlled. The use of privileged utility programs shall be restricted and tightly controlled.
    iam-role-assume-role-mfa-enforcementEnsures IAM roles require MFA when assumed by human users (not AWS services)01.p Secure Log-on ProceduresLog-on procedures shall be designed to minimize the opportunity for unauthorized access. Log-on procedures shall reveal the minimum of information necessary to allow authorized users to recognize that they have accessed the appropriate system.
    iam-user-mfa-console-accessEnsures IAM users with console access have MFA devices01.p Secure Log-on ProceduresLog-on procedures shall be designed to minimize the opportunity for unauthorized access. Log-on procedures shall reveal the minimum of information necessary to allow authorized users to recognize that they have accessed the appropriate system.
    no-direct-user-access-keysPrevents creation of direct IAM user access keys for human users01.p Secure Log-on ProceduresLog-on procedures shall be designed to minimize the opportunity for unauthorized access. Log-on procedures shall reveal the minimum of information necessary to allow authorized users to recognize that they have accessed the appropriate system.
    limit-lambda-execution-timeEnsures that AWS Lambda functions are configured to time out after a specified duration to prevent extended access01.u Limitation of Connection TimeInactive sessions shall shut down after a defined period of inactivity.
    s3-bucket-least-privilegePrevents overly permissive S3 bucket policies01.v Information Access RestrictionAccess to systems and applications shall be restricted in accordance with the access control policy.
    vpc-endpoint-security-policyEnsures that VPC endpoints are associated with security policies that limit access to specified resources01.v Information Access RestrictionAccess to systems and applications shall be restricted in accordance with the access control policy.
    athena-database-disallow-unencrypted-databaseChecks that Athena Databases storage is encrypted.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    athena-workgroup-disallow-unencrypted-workgroupChecks that Athena Workgroups are encrypted.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    ebs-volume-disallow-unencrypted-volumeChecks that EBS volumes are encrypted.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    ec2-instance-disallow-unencrypted-block-deviceChecks that EC2 instances do not have unencrypted block devices.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    ec2-instance-disallow-unencrypted-root-block-deviceChecks that EC2 instances does not have unencrypted root volumes.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    ec2-launch-configuration-disallow-unencrypted-block-deviceChecks that EC2 Launch Configurations do not have unencrypted block devices.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    ec2-launch-configuration-disallow-unencrypted-root-block-deviceChecks that EC2 launch configuration do not have unencrypted root block device.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    ec2-launch-template-disallow-unencrypted-block-deviceChecks that EC2 Launch Templates do not have unencrypted block device.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    ecr-repository-disallow-unencrypted-repositoryChecks that ECR Repositories are encrypted.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    efs-file-system-disallow-unencrypted-file-systemChecks that EFS File Systems do not have an unencrypted file system.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    eks-cluster-enable-cluster-encryption-configCheck that EKS Cluster Encryption Config is enabled.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    rds-cluster-configure-customer-managed-keyChecks that RDS Clusters storage uses a customer-managed KMS key.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    rds-cluster-disallow-unencrypted-storageChecks that RDS Clusters storage is encrypted.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    rds-instance-configure-customer-managed-keyChecks that RDS Instance storage uses a customer-managed KMS key.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    rds-instance-disallow-unencrypted-storageChecks that RDS instance storage is encrypted.06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    kinesis-stream-retentionEnsures Kinesis streams have retention periods configured06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    no-hardcoded-secretsEnsures EC2 instances do not contain hardcoded secrets06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    rds-cluster-secure-master-credentialsEnsures RDS clusters use secure credential management instead of hardcoded passwords06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    rds-secure-master-credentialsEnsures RDS instances use secure credential management instead of hardcoded passwords06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    s3-bucket-encryptionS3 buckets must have server-side encryption configured using BucketServerSideEncryptionConfiguration resource06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    s3-bucket-lifecycleEnsures each S3 bucket has lifecycle rules configured for retention/disposal06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    s3-bucket-macie-accessEnsures S3 buckets allow AWS Macie access for data classification and discovery06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    s3-bucket-versioningS3 buckets must have versioning enabled using BucketVersioning resource06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    sqs-encryptionEnsures SQS queues have server-side encryption enabled06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    sqs-message-retentionEnsures SQS queues have message retention periods configured06.d Data Protection and Privacy of Covered InformationCovered information shall be protected against unauthorized disclosure, modification and destruction. For the purpose of this control, covered information includes protected health information, cardholder data, and other sensitive information.
    vpc-flow-logsEnsures VPC flow logs use approved destinations for centralized monitoring09.aa Audit LoggingThe organization shall ensure that audit logs are enabled and monitored for sensitive systems.
    lambda-function-documentationEnsures all AWS Lambda functions have a documented description attribute09.b Change ManagementChanges to systems, applications and supporting infrastructure shall be controlled.
    resource-taggingEnsures all AWS resources must include tags for proper change tracking09.b Change ManagementChanges to systems, applications and supporting infrastructure shall be controlled.
    environment-separation-taggingEnsures that resources are tagged to distinguish between production and non-production environments09.d Separation of Development, Test, and Operational EnvironmentsDevelopment, testing, and operational environments shall be separated to reduce the risks of unauthorized access or changes to the operational environment.
    s3-bucket-access-loggingEnsures each S3 bucket has access logging enabled09.e Service DeliveryPolicy ensures compliance with HITRUST security requirements.
    api-gateway-waf-associationEnsures public-facing API Gateways have WAF associations09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    appsync-waf-associationEnsures public-facing AppSync GraphQL APIs have WAF associations09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    cloudfront-distribution-configure-wafChecks that any CloudFront distribution has a WAF ACL associated.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    ec2-instance-disallow-public-ipChecks that EC2 instances do not have a public IP address.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    ec2-launch-configuration-disallow-public-ipChecks that EC2 Launch Configurations do not have a public IP address.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    ec2-launch-template-disallow-public-ipChecks that EC2 Launch Templates do not have public IP addresses.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    ec2-security-group-disallow-inbound-http-trafficCheck that EC2 Security Groups do not allow inbound HTTP traffic.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    eks-cluster-disallow-api-endpoint-public-accessCheck that EKS Clusters API Endpoint are not publicly accessible.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    rds-cluster-instance-disallow-public-accessChecks that RDS Cluster Instances public access is not enabled.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    neptune-clusterinstance-no-public-accessChecks that Neptune Cluster Instances public access is not enabled.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    rds-instance-disallow-public-accessChecks that RDS Instance public access is not enabled.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    s3-bucket-disallow-public-readChecks that S3 Bucket ACLs don’t allow ‘public-read’ or ‘public-read-write’ or ‘authenticated-read’.09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    cloudfront-waf-associationEnsures CloudFront distributions have WAF associations09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    database-strict-network-accessEnsures RDS instances have strict network access controls09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    load-balancer-waf-associationEnsures public-facing Load Balancers have WAF associations09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    rds-private-subnet-validationValidates that RDS DB subnet groups contain only private subnets09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    s3-bucket-public-access-blockEnsures each S3 bucket has a public access block with all settings enabled09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    security-group-default-denyEnsures Security Groups follow default deny with explicit allow principle09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    security-group-strictEnsures security groups follow strict firewall rules with default deny09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    subnet-multi-azEnsures subnets are distributed across multiple availability zones09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    waf-association-validationValidates WAF Web ACL associations are properly configured09.m Network ControlsNetworks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transit.
    api-gateway-access-loggingEnsures API Gateway stages have access logging enabled09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    api-gateway-v2-access-loggingEnsures API Gateway V2 stages have access logging enabled09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    api-gateway-v2-stage-configure-access-loggingChecks that any ApiGatewayV2 Stages have access logging configured.09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    api-gateway-v2-stage-enable-access-loggingChecks that any ApiGatewayV2 Stages have access logging enabled.09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    cloudfront-distribution-configure-access-loggingChecks that any CloudFront distributions have access logging configured.09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    cloudfront-distribution-enable-access-loggingChecks that any CloudFront distributions have access logging enabled.09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    elb-load-balancer-configure-access-loggingCheck that ELB Load Balancers uses access logging.09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    centralized-os-app-loggingEnsures EC2 instances have logging agents configured to forward OS/application logs to central system09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    rds-audit-loggingEnsures RDS instances have audit logging enabled09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    vpc-subnet-flow-logsEnsures all VPCs and subnets have flow logs enabled09.z Publicly Available InformationPublicly available information shall be protected against unauthorized modification or deletion.
    dynamodb-streams-enabledEnforces that all DynamoDB tables have Stream settings enabled to capture all changes10.c Control of Internal ProcessingInput data validation and output controls shall be applied to safeguard against errors, loss, unauthorized modification or misuse of information in applications.
    lambda-environment-variables-encryptionEnsures that all Lambda functions have their environment variables encrypted using AWS KMS10.d Message IntegrityIntegrity shall be applied to messages using cryptography or digital signatures, where deemed appropriate.
    lambda-function-loggingEnsures that all AWS Lambda functions have logging enabled to track output data processing10.e Output Data ValidationOutput data from applications shall be validated to ensure that the processing of stored information is correct and appropriate to the circumstances.
    api-gateway-domain-name-configure-security-policyChecks that ApiGateway Domain Name Security Policy uses secure/modern TLS encryption.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    api-gateway-v2-domain-name-configure-domain-name-security-policyChecks that any ApiGatewayV2 Domain Name Security Policy uses secure/modern TLS encryption.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    api-gateway-v2-domain-name-enable-domain-name-configurationChecks that any ApiGatewayV2 Domain Name Configuration is enabled.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    appflow-connector-profile-configure-customer-managed-keyCheck that AppFlow ConnectorProfile uses a customer-managed KMS key.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    appflow-flow-configure-customer-managed-keyCheck that AppFlow Flow uses a customer-managed KMS key.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    athena-database-configure-customer-managed-keyChecks that Athena Databases storage uses a customer-managed-key.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    athena-workgroup-configure-customer-managed-keyChecks that Athena Workgroups use a customer-managed-key.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    cloudfront-distribution-configure-secure-tls-to-originChecks that CloudFront distributions communicate with custom origins using TLS 1.2 encryption only.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    cloudfront-distribution-configure-secure-tlsChecks that CloudFront distributions uses secure/modern TLS encryption.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    cloudfront-distribution-disallow-unencrypted-trafficChecks that CloudFront distributions only allow encypted ingress traffic.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    cloudfront-distribution-enable-tls-to-originChecks that CloudFront distributions communicate with custom origins using TLS encryption.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    ebs-volume-configure-customer-managed-keyCheck that encrypted EBS volumes use a customer-managed KMS key.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    ec2-launch-template-configure-customer-managed-keyCheck that encrypted EBS volume uses a customer-managed KMS key.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    ecr-repository-configure-customer-managed-keyChecks that ECR repositories use a customer-managed KMS key.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    efs-file-system-configure-customer-managed-keyCheck that encrypted EFS File system uses a customer-managed KMS key.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    elb-load-balancer-disallow-unencrypted-trafficCheck that ELB Load Balancers do not allow unencrypted (HTTP) traffic.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    kms-key-enable-key-rotationChecks that KMS Keys have key rotation enabled.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    secrets-manager-secret-configure-customer-managed-keyCheck that Secrets Manager Secrets use a customer-manager KMS key.10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    kms-key-creationValidates KMS key creation with appropriate specifications and origins10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    kms-key-deletion-lifecycleValidates KMS key deletion windows and lifecycle management10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    rds-clusterinstance-ssl-encryptionEnsures RDS cluster instances have SSL/TLS encryption enabled through parameter group configuration10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    rds-instance-ssl-encryptionEnsures RDS instances have SSL/TLS encryption enabled through parameter group configuration10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    security-group-ssh-rdpEnsures security groups do not allow SSH/RDP from the internet10.f Policy on the Use of Cryptographic ControlsCryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations, and risk assessments shall consider the organization
    athena-workgroup-enforce-configurationChecks that Athena Workgroups enforce their configuration to their clients.10.h Control of Operational SoftwareThe installation of software on operational systems shall be controlled.
    ecr-repository-disallow-mutable-imageChecks that ECR Repositories have immutable images enabled.10.h Control of Operational SoftwareThe installation of software on operational systems shall be controlled.
    lambda-runtime-restrictionsEnsures that AWS Lambda functions are created only with approved runtime versions10.h Control of Operational SoftwareThe installation of software on operational systems shall be controlled.
    rds-instance-managed-service-patchingEnsures RDS instances have automated minor version upgrades enabled10.k Change Control ProceduresChanges to systems within the development lifecycle shall be controlled by the use of formal change control procedures.
    rds-clusterinstance-managed-service-patchingEnsures RDS cluster instances have automated minor version upgrades enabled10.k Change Control ProceduresChanges to systems within the development lifecycle shall be controlled by the use of formal change control procedures.
    neptune-clusterinstance-managed-service-patchingEnsures Neptune cluster instances have automated minor version upgrades enabled10.k Change Control ProceduresChanges to systems within the development lifecycle shall be controlled by the use of formal change control procedures.
    docdb-clusterinstance-managed-service-patchingEnsures DocumentDB cluster instances have automated minor version upgrades enabled10.k Change Control ProceduresChanges to systems within the development lifecycle shall be controlled by the use of formal change control procedures.
    anti-malware-edrEnsures EC2 instances have anti-malware/EDR agents deployed10.m Control of Technical VulnerabilitiesInformation about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization
    ecr-repository-configure-image-scanChecks that ECR repositories have ‘scan-on-push’ configured.10.m Control of Technical VulnerabilitiesInformation about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization
    ecr-repository-enable-image-scanChecks that ECR repositories have ‘scan-on-push’ enabled.10.m Control of Technical VulnerabilitiesInformation about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization
    ecr-image-scanningEnsures ECR repositories have image scanning enabled for vulnerability management10.m Control of Technical VulnerabilitiesInformation about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization
    ecs-task-definition-image-scanningEnsures ECS task definitions use images from repositories with vulnerability scanning10.m Control of Technical VulnerabilitiesInformation about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization
    elb-load-balancer-configure-multi-availability-zoneCheck that ELB Load Balancers uses more than one availability zone.12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
    elb-load-balancer-enable-health-checkCheck that ELB Load Balancers have a health check enabled.12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
    rds-cluster-disallow-single-availability-zoneCheck that RDS Cluster doesn’t use single availability zone.12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
    rds-cluster-enable-backup-retentionChecks that RDS Clusters backup retention policy is enabled.12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
    rds-instance-enable-backup-retentionChecks that RDS Instances backup retention policy is enabled.12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
    kinesis-event-source-mapping-dlqEnsures Kinesis Lambda event source mappings have DLQ configuration12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
    rds-instance-high-availabilityEnsures RDS instances have Multi-AZ deployment enabled for high availability12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
    s3-bucket-replicationEnsures S3 buckets have replication configured for enhanced availability12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
    sns-subscription-dead-letter-queueEnsures SNS subscriptions have dead letter queue configuration12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
    sqs-dead-letter-queueEnsures SQS queues have dead letter queue configuration12.a Including Information Security in the Business Continuity ManagementInformation security shall be a central part of the organization
      Neo just got smarter about infrastructure policy automation